-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[SIEM] Non-ECS fields in SIEM #43649
Comments
Pinging @elastic/siem |
thanks @cwurm for pulling this together. |
|
EndgameEndgame row renderers, added to 7.5 with this PR, use the following non-ECS fields:
Note that some of these fields, such as |
An update on TLS: As of ECS 1.4 the necessary TLS fields are present. In Packetbeat 7.6 we made the change to adopt ECS for all of the TLS fields. Now the SIEM UI needs updated. |
#60584 in 7.7 doesn't seem to have updated the TLS fields used in row renderers, such as certificate fingerprints, it only updated the main table. |
I went through the SIEM app code to find any fields that are not in ECS. Some we can fix today, some we have to wait for ECS to add them.
The SIEM app uses fields in many places, so it's likely I missed some, but the main ones are hopefully here.
Autonomous System
ASN info is now in ECS master (ECS docs). There are several places where we use out of data field names. This is something we can fix today.
ip_details/query_overview.dsl.ts
(code):autonomous_system
- should beas
. Alternatively, we can use the Ingest Pipeline Simulate API to populate Location and ASN (https://github.com/elastic/siem-team/issues/310).field_renderers.tsx
(code)autonomous_system.as_org
- should beas.organization.name
autonomous_system.asn
- should beas.number
TLS
We don't have TLS in ECS yet, so the TLS table on the IP Details page and the TLS Handshakes KPI on the Network page are using other fields such as those currently filled by the Packetbeat TLS protocol decoder (Packetbeat docs).
ip_details/query_tls.dsl.ts
(code):tls.server_certificate.fingerprint.sha1
tls.server_certificate.issuer.common_name
tls.server_certificate.subject.common_name
tls.server_certificate.alternative_names
tls.server_certificate.not_after
tls.fingerprints.ja3.hash
kpi_network/query_tls_handshakes.dsl.ts
(code)tls.version
suricata.eve.tls.version
zeek.ssl.version
ja3_fingerprint/index.tsx
(code)tls.fingerprints.ja3.hash
certificate_fingerprint/index.tsx
(code)tls.client_certificate.fingerprint.sha1
tls.server_certificate.fingerprint.sha1
DNS
DNS is almost merged into ECS (elastic/ecs#438). Some of the fields the SIEM app now uses are in the PR, and some are not. We will first have to change the data sources (Packetbeat, Filebeat, Winlogbeat) and then we can look into how and when to change the queries.
kpi_network/query_dns.dsl.ts
(code)dns.question.name
suricata.eve.dns.type: query
zeek.dns.query
network/query_dns.dsl.ts
(code)dns.question.etld_plus_one
dns.question.type: PTR
dns.question.name
Event Categories
The Overview page is trying to query for which data is available. In the absence of a canonical "this is this kind of data" field in ECS it uses various combinations that are agent-specific. This makes it hard to treat third-party data (even data from Logstash) the same as Beats data.
Same for the Uncommon Processes table trying to determine what a process is. For that, Winlogbeat has recently added
event.category=process
/event.type: process_start/process_end
(elastic/beats#13047).overview/query.dsl.ts
(code)type: flow
type: dns
service.type: suricata
service.type: zeek
event.dataset: socket
agent.type: filebeat AND input.type: netflow
agent.type: filebeat AND event.module: panw
agent.type: filebeat AND event.module: cisco
agent.type: packetbeat AND network.protocol: tls
event.module: auditd
event.module: file_integrity
agent.type: winlogbeat
event.module: system AND event.dataset: login
event.module: system AND event.dataset: package
event.module: system AND event.dataset: process
event.module: system AND event.dataset: user
agent.type: filebeat
uncommon_processes/query.dsl.ts
(code)agent.type: filebeat AND event.module: auditd AND event.action: executed
agent.type: auditbeat AND event.module: system AND event.dataset: process
agent.type: winlogbeat AND event.code: 4688
winlog.event_id: 1 AND winlog.channel: Microsoft-Windows-Sysmon/Operational
/cc @webmat @MikePaquette
The text was updated successfully, but these errors were encountered: